« List of all CVEs

CVE-2023-39193

Kernel: netfilter: xtables sctp out-of-bounds read in match_flags()

Published: 10/9/2023 Last updated: 11/15/2024 Reserved: 7/25/2023

A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

CNA assigner: redhat (53f830b8-0a3f-465b-8143-3b8a9948e749) Requested by: n/a

Metrics

Version Score Severity Vector String
3.1 6.1 Medium CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L

Opam packages affected (27)

albatross cdrom conf-bpftool conf-libbpf conf-linux-libc-dev core core_unix hvsock mirage-block-unix mm ocaml-probes orun rawlink rawlink-eio rawlink-lwt shell solo5 solo5-bindings-hvt solo5-bindings-spt solo5-cross-aarch64 solo5-kernel-ukvm tracy-client tuntap uring vhd-format vhd-format-lwt xapi-stdext-unix

Products affected (8)

Product Vendor Version
Red Hat Enterprise Linux 7 Red Hat <= 5.15.*
Red Hat Enterprise Linux 8 Red Hat >= 22.0.0, < 22.2.10.16
Red Hat Enterprise Linux 9 Red Hat fe75e8a0c20127a8dc95704f1a7ad6b82c9a0ef8
Red Hat Enterprise Linux 9 Red Hat < 2024.3.55417
Red Hat Enterprise Linux 6 Red Hat < 101.0.4951.64
Red Hat Enterprise Linux 9 Red Hat n/a
Red Hat Enterprise Linux 7 Red Hat n/a
Red Hat Enterprise Linux 8 Red Hat < 10.0.19045.3208

References (13)